{
	"id": "90d19974-ff5a-48c5-8012-4da9c585c2a9",
	"created_at": "2026-04-06T00:14:03.286275Z",
	"updated_at": "2026-04-10T03:21:47.958807Z",
	"deleted_at": null,
	"sha1_hash": "4f4cef5ca8c4f2f3924f433e9762667fb0c3e4bc",
	"title": "Phishing Defense Powered by AI \u0026 Human Insight",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 6692557,
	"plain_text": "Phishing Defense Powered by AI \u0026 Human Insight\r\nArchived: 2026-04-05 12:38:07 UTC\r\nAI-Powered Phishing is Fast\r\nIt Never Stops Changing\r\nEven strong perimeter defenses can’t catch every phish. Cofense combines specialized AI with expert validation\r\nfor post-perimeter detection that identifies and remediates threats and strengthens organizational resilience.\r\nRequest A Demo\r\nTrusted for Faster, Smarter Phishing Threat Defense\r\nPhishing Gets Through - The Real Challenges Start After Delivery\r\nUnified Phishing Defense\r\nTurns Intelligence into Action\r\nOne connected platform that detects what others miss, accelerates remediation, and reduces risk across the post-perimeter phishing lifecycle.\r\nExplore the Platform\r\nhttps://cofense.com/blog/bazarbackdoor-stealthy-infiltration\r\nPage 1 of 3\n\nThe Measurable Impact of Smarter Phishing Defense\r\nhttps://cofense.com/blog/bazarbackdoor-stealthy-infiltration\r\nPage 2 of 3\n\nImprove SOC Efficiency\r\n5x ROI\r\nwith fully managed program\r\nwith fully managed program\r\nExpose Unknown Threats\r\n70%\r\nof attacks identified from global network\r\nFewer Misses through Collective Intelligence.\r\nRemediate Faster\r\n8 minutes\r\nto process and remediate\r\nMinutes to Analyze. Seconds to Remove.\r\nMitigate Future Threats\r\n26%\r\nhigher employee resilience\r\nReal Phish Drive Lasting Behavior Change.\r\nTrusted by Enterprise Security Teams\r\nCase Study\r\nE-Book\r\nROI Calculator\r\nSource: https://cofense.com/blog/bazarbackdoor-stealthy-infiltration\r\nhttps://cofense.com/blog/bazarbackdoor-stealthy-infiltration\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"references": [
		"https://cofense.com/blog/bazarbackdoor-stealthy-infiltration"
	],
	"report_names": [
		"bazarbackdoor-stealthy-infiltration"
	],
	"threat_actors": [],
	"ts_created_at": 1775434443,
	"ts_updated_at": 1775791307,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4f4cef5ca8c4f2f3924f433e9762667fb0c3e4bc.pdf",
		"text": "https://archive.orkl.eu/4f4cef5ca8c4f2f3924f433e9762667fb0c3e4bc.txt",
		"img": "https://archive.orkl.eu/4f4cef5ca8c4f2f3924f433e9762667fb0c3e4bc.jpg"
	}
}